Welcome: To The Constructing A Secure SD-WAN Architecture Lab
Welcome: To The Constructing A Secure SD-WAN Architecture Lab
0
Use Case: Introduction
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Welcome
to the
Constructing a Secure SD-WAN Architecture Lab
In this Fast Track, you implement SD-WAN via FortiManager to remotely setup IPSEC VPN
tunnels between headquarter’s datacenter and two branch offices. You then setup SD-WAN on
the two branch FortiGate devices at the same time.
Index: 1.0 (a)
Use Case: Introduction
Objective Title: Topology
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Network Topology
The lab environment represents a fictional company, AcmeCorp. It has a headquarters (HQ)
data center and two branch offices (Branch 1 and Branch 2). Previously, AcmeCorp backhauled
all the internet traffic from the branch offices to HQ for processing. Now, due to the use of
cloud-based solutions increasing and leased lines becoming more expensive, AcmeCorp is
deploying FortiGate devices at the branch offices to allow direct connectivity to the internet, as
well as using internet service provider (ISP) links to augment the multiprotocol label switching
(MPLS) leased line to HQ.
A FortiManager and a FortiVoice appliance are installed in the HQ Data Center. The Fortifone
software is also installed on all of the workstations.
Index: 1.0 (b)
Use Case: Introduction
Objective Title: Agenda
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Agenda
Topic Time
Lab 1: Introduction – Topology and Agenda 2 Minutes
Lab 2: Configuring SD-WAN via FortiManager 30 Minutes
Index: 2.0
Use Case: Configure SD-WAN via FortiManager
Objective Title: Configure SD-WAN via FortiManager
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Currently, AcmeCorp backhauls all the internet traffic from the branch offices to HQ for
processing. They want to deploy FortiGate devices at the branch offices to allow direct
connectivity to the internet. This will not only offload much of the traffic off of the
multiprotocol label switching (MPLS) leased line, but the internet service provider (ISP) link will
also act as a backup for the MPLS link.
In this exercise, you use FortiManager to remotely configure SD-WAN between the branch
offices and HQ. You will also create an SD-WAN zone to control local internet breakout.
Index: 2.0 (a)
Use Case: Configure SD-WAN via FortiManager
Objective Title: Setting up IPsec VPN
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Background
AcmeCorp is using FortiManager to centrally provision and manage its devices. At the
headquarters (HQ) in Sunnyvale, AcmeCorp has a core FortiGate (FGT-HQ). There are currently
two FortiGate devices that are operational but not fully configured at branch offices in Ottawa
and New York (FGT-BR1 and FGT-BR2). AcmeCorp deployed FortiGate devices at the branches
to allow the use of the ISP link to augment their MPLS leased line to HQ.
As it will be using the internet as part of its connections between HQ and the branches, they
will be implementing VPNs. As such, AcmeCorp needs to add an IPsec VPN over its internet link
to HQ from the Branches. FortiManager allows centralized management of VPNs, which
includes configuring the VPNs as well as monitoring the VPNs.
Task
For this objective, we will be working on the FortiManager. From the Lab Activity tab, click
FortiManager in the side bar lab menu, then select HTTPS to connect to the FortiManager.
Log in using the following credentials:
Username: admin Password: Fortinet1!
Your goal for this objective is to add the FortiGate devices ( FGT-HQ, FGT-BR1, and FGT-BR2 ) to
the community.
4. When the wizard opens, select all for the Protected Subnet and click OK.
5. Click Next.
13. Create two additional managed gateway policies to add FGT-BR1 and FGT-BR2. Set Role to
Spoke and Device to the appropriate branch FortiGate. Use the same settings as the first
managed gateway policy for the rest of the configuration.
14. When you have configured all three gateway policies, your screen should look like this:
Index: 2.0 (b)
Use Case: Configure SD-WAN via FortiManager
Objective Title: Installing the Managed Gateway Policies
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Task:
Your goal for this objective is to install the hub package on FGT-HQ, and the spoke packages on
FGT-BR1 and FGT-BR2. For all three devices, use the Install Policy Package & Device Settings
option.
2. Click Install Policy Package & Device Settings and set Policy Package to FG-HQ. Click Next.
3. Verify that FGT-HQ is selected and click Next.
Monitor View
1. Once you have installed the policy, click VPN Manager > Monitor. You can see that the
tunnels are all up.
2. Click Map View to show the tunnels on a world map (if the map does not appear after
about 30 seconds, press F5 to refresh the page).
3. Click Traffic View to see network traffic flowing between the protected subnets.
Index: 2.0 (c)
Use Case: Configure SD-WAN via FortiManager
Objective Title: VPN Tunnel Endpoints
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Background
To complete the IPsec VPN configuration, you need to configure the tunnel endpoint addresses
(you can find them in the interface pages from the devices in Device Manager > Device &
Groups).
Task
Your goal for this objective is to edit the IPsec tunnel endpoints
5. Click OK.
6. Under Managed Devices, click FGT-BR2.
7. Edit HQVPN_1.
8. In the Address section, set IP/Network to 10.10.2.2/32 and Remote IP to
10.10.2.1/32.
9. Click OK.
10. Under Managed Devices, click FGT-HQ.
11. Edit HQVPN_2.
12. In the Address section, set IP/Network to 10.10.1.1/32 and Remote IP to
10.10.1.2/32.
Push Configurations
Background
AcmeCorp wants to use both the MPLS leased line and the IPsec links you previously created to
route traffic back to HQ when the branch offices need to utilize corporate resources.
Along with VPNs, you can also centrally manage SD-WAN from FortiManager. For this lab,
SD-WAN is already enabled in System Settings.
Task
Your goal for this objective is to set up SD-WAN by creating a new SD-WAN template.
SD-WAN Template
Interface Members
1. In the Interface member section, click Create New > SD-WAN Member.
3. Repeat the steps above and add VPN and ISP_1 as members to the virtual-wan-link SD-WAN
Zone.
4. Click OK
Performance SLA
This rule will guide all traffic intended for the main office (FG-HQ) through the MPLS link, while
using the VPN for backup in the event the MPLS link goes down.
This rule will direct any traffic not intended for HQ to the ISP_1 interface, allowing direct
internet access.
Background
Now that you have created the SD-WAN template, you can assign the template to the branch FortiGate
devices and install it.
Task
Your goal for this objective is to assign the SD-WAN template to the branch FortiGate devices and push
the install.
2. Select FGT-BR1 and FGT-BR2 and move them to the Selected Entries column.
3. Click OK.
3. Confirm that both FGT-BR1 and FGT-BR2 are selected and click Next.
4. When prompted, click Install.
5. When the installation is finished, click Finish.
1. To monitor the SD-WAN, click the SD-WAN tab and select Monitor.
2. Click Map View (if the map does not appear after about 30 seconds, press F5 to refresh the
page).
This view displays SD-WAN enabled devices on Google Map with color-coded icons. You can
view bandwidth usage on the right. If you hover over an interface, you can view health
performance statistics for each SD-WAN link member.
3. Click Table View. This view provides information on each SD-WAN link member, such as link
status, applications performance, and bandwidth usage.
Index: 2.0 (f)
Use Case: Configure SD-WAN via FortiManager
Objective Title: Edit Default Route
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Background
Now that you have the basic SD-WAN configurations done and installed on the devices, you still
need to alter the default route to use the SD-WAN virtual interface on the two branch FortiGate
devices.
Tasks
In this exercise, you edit the default route on the branch devices to use the SD-WAN virtual
interface as the egress interface.
6. Click OK.
Push Policies
3. Confirm that both branch devices are selected and click Next.
4. After Installation Preparation completes, click Install.
5. After the installation completes, click Finish.
Index: 2.0 (g)
Use Case: Configure SD-WAN via FortiManager
Objective Title: Examining the Configurations
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
2. You are presented with a warning that this FortiGate is managed by FortiManager. Select
Login Read-Only.
3. Click Dashboard > Network. Notice that the IPsec widget lists the HQVPN_1 tunnel and
there are 10 routes in the Routing widget.
4. Click on the Routing widget to inspect the routes.
SD-WAN settings
1. Click Network > SD-WAN Zones.
2. Expand the zones to display the member interfaces.
7. Click OK.
Generate traffic
1. Return to the Lab Activity tab and click on Bob (in Finance), then select the RDP option
to access Bob’s workstation.
2. Open FortiFone .
3. Likewise, click on Carol (in Branch 1) then select RDP to access her workstation.
4. Open Terminal and ping 172.16.100.135.
5. After a few pings, press Ctrl C and then ping 8.8.8.8.
3. Open FortiFone .
Device
Source Port
Destination Port
Bytes
Packets
Duration
10. Select Destination Interface and Source Interface.
11. Click Apply.
12. Notice that the ping (ICMP) to 172.16.100.135 and the softphone (both traffic going
back to the HQ ) are directed through the MPLS interface, and the ping to 8.8.8.8 (internet)
is going out the local internet breakout.
Note: Other applications on the Ubuntu device may also be generating internet traffic.
When you click Continue on the FortiFIED app, the MPLS network will be disabled to simulate a
failure and cause the SD-WAN rule to fail over to the other link.
Index: 2.0 (h)
Use Case: Configure SD-WAN via FortiManager
Objective Title: Verify the Failover
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Background
A failure in the MPLS line was simulated in order to see the SD-WAN automatically failover to
the HQVPN_1 interface, which in this scenario, was acting as the backup to the MPLS lines
Task
1. Return to the FGT-BR1 browser tab.
2. Click Network > SD-WAN Rules.
3. Confirm that the rules are now directing traffic to HQ via the HQVPN_1 tunnel.
Note: you may have to refresh the page
Thank You